Googlestroika: Five Years Later Karl T

Total Page:16

File Type:pdf, Size:1020Kb

Googlestroika: Five Years Later Karl T NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY Volume 16 | Issue 3 Article 5 3-1-2015 Googlestroika: Five Years Later Karl T. Muth Follow this and additional works at: http://scholarship.law.unc.edu/ncjolt Part of the Law Commons Recommended Citation Karl T. Muth, Googlestroika: Five Years Later, 16 N.C. J.L. & Tech. 487 (2015). Available at: http://scholarship.law.unc.edu/ncjolt/vol16/iss3/5 This Article is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of Law & Technology by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY VOLUME 16, ISSUE 3: MARCH 2015 GOOGLESTROIKA: FIVE YEARS LATER Karl T. Muth* This article re-examines and revises observations made in the author’s 2009 article, Googlestroika: Privatizing Privacy.1 Specifically, it looks to the contractual obligations and practical considerations that define how users interact not only with Google, but also with social network websites and other online service providers. Consideration is given to how an individual leaves a social network, or terminates “membership” and technical matters, such as the implications of so-called private modes in web browsers. This Article is a review of where the market in privacy stands today and discusses some, but by no means all, changes in law, policy, litigation, regulation, and contract arrangements since the first article’s publication in 2009. Its focus, as with Googlestroika, is to reconcile the user experience of Internet services with the terms of use and contractual provisions that govern the interactions between consumer and provider. * SEI Fellow, The University of Chicago Booth School of Business; Lecturer in Economics, Public Policy, and Statistics, Northwestern University. This Article is a sequel to, and revision of, the comments offered by the same author five years earlier in Googlestroika: Privatizing Privacy, 47 DUQ. L. REV. 337 (2009). The views in this Article belong only to the author and should not be presumed to be held by the institutions, firms, or persons with which he is affiliated. Thanks to Elizabeth M. Schutte, one of my dearest friends; without her thoughts and criticisms years ago, Googlestroika would not have been strong enough to support or deserve a sequel. Thanks to employees at certain firms mentioned here who allowed me to interview them. Finally, thanks to Professor Randy Picker of the University of Chicago School of Law; if I had not taken his wonderful course years ago, I doubt I would have noticed or appreciated the complexity and importance of issues in this area of law. Raymond Wang and Amy Taylor offered comments on pertinent issues and earlier drafts. 1 Karl T. Muth, Googlestroika: Privatizing Privacy, 47 DUQ. L. REV. 337 (2009) [hereinafter Googlestroika 1]. 487 488 N.C. J.L. & TECH. [VOL. 16: 487 TABLE OF CONTENTS I. INTRODUCTION—WORKING BACKWARD FROM WURIE ................................................................................ 490 II. PROVIDER CONTRACTS THEN AND NOW: AN EVOLUTION ........................................................................ 495 A. Google, Gmail, YouTube, Google+, and the Mountain View Approach ............................................ 496 B. Bing, Xbox, OneDrive, Azure, and the Redmond Approach ...................................................................... 501 C. Facebook and the Menlo Park Approach .................... 502 D. Apple, iTunes, and the Cupertino Approach ................ 505 E. Twitter and the Market Street Approach ..................... 507 III. JOINING THE NETWORK: USER AGREEMENTS & INITIAL ASSENTS ............................................................... 508 A. Google .......................................................................... 508 B. Bing .............................................................................. 509 C. Facebook ...................................................................... 510 D. Apple ............................................................................ 511 E. Twitter .......................................................................... 512 IV. LEAVE NO TRACE? GOING OFF THE GRID ...................... 512 A. Leaving Google ............................................................ 512 1. Gmail as a Distinguishable or Separate Service ... 512 2. YouTube as a Separate Set of Agreements ............. 513 3. Incognito Browsing Within Chrome: An Exception? ............................................................. 514 B. Leaving Bing ................................................................ 515 1. Azure as a Separate Set of Services ....................... 516 2. Skype as a Quasi-Social Service ............................ 516 3. InPrivate Browsing within Internet Explorer: An Exception? ........................................................ 517 C. Leaving Facebook ........................................................ 519 1. Facebook’s Download Feature and Its Purpose ... 519 2. Facebook’s Two-Week Waiting Period ................. 520 3. Private Browsing and Facebook: An Exception? .. 521 D. Leaving Apple .............................................................. 521 E. Leaving Twitter ............................................................ 522 MAR. 2015] Googlestroika 489 V. HYPOTHETICAL LITIGATION & OPERATIVE ANALOGIES ........................................................................ 523 VI. A COMPROMISE? CONSIDERING NEW CONTRACT IDEAS FOR SOCIAL NETWORKS ........................................ 524 490 N.C. J.L. & TECH. [VOL. 16: 487 I. INTRODUCTION—WORKING BACKWARD FROM WURIE Five years ago, this Article’s predecessor, Googlestroika: Privatizing Privacy, was published. It discussed Google’s business model of gathering information about people and using this information, selling this information to advertisers, and otherwise finding ways to turn this information into money. The article focused on the fact that many users see Facebook, Google, and other services as “free,” rather than recognizing that their use of these services is a barter arrangement in which they trade their privacy for services. The opacity of this bargain—and the opaque market in privacy-related transactions in general—leads to a series of problems.2 There is no doubt that terms of service agreements and end user agreements have changed in the past five years. Consumer behaviors have also changed since 2009: more people have so-called smartphones and more people store enormous amounts of information in the cloud, on free services like Gmail,3 or in free social networking repositories like Facebook and Twitter. In addition, consumers are more savvy about bartering their privacy for services, something not discussed five years ago—as CNET put it in a recent article, “[W]eb surfers are used to dealing with the privacy versus profit trade-off . .”4 Finally, the contract terms themselves have changed—not only at Google, but also at Bing, Facebook, Twitter, and elsewhere. The heterogeneity of approaches to contractual questions is worthy of study—who really has what 2 See, e.g., Andrew Schwartz, Consumer Contract Exchanges and the Problem of Adhesion, 28 YALE J. ON REG. 313, 347 n.200 (2011) (calling the Google Terms of Service a contract of adhesion and citing Googlestroika 1); Victoria Schwartz, Disclosing Corporate Disclosure Policies, 40 FLA. ST. U. L. REV. 487, 502 (2013) (noting market-based privacy dilemmas and citing Googlestroika 1); see generally Nathan Newman, The Costs of Lost Privacy: Consumer Harm and Rising Economic Inequality in the Age of Google, 40 WM. MITCHELL L. REV. 849 (2014) (asserting that consumers are unaware of the “harm from the extractions of personal data” done by companies such as Google). 3 Google has, over the years, alternatively branded its email service “gmail” and “Gmail”—for the sake of consistency, I refer to all vintages of Gmail with a capitalized “G” herein. 4 Elinor Mills, Deleting Your Facebook Account (FAQ), CNET, (May 21, 2010, 4:00 AM), http://www.cnet.com/how-to/deleting-your-facebook-account-faq/. MAR. 2015] Googlestroika 491 type of license to those photos of your son’s birthday party that you uploaded to Twitter and Facebook or sent to grandma via Gmail? The Court’s consideration of the mobile phone’s role in modern life in United States v. Wurie5 recognizes a new relationship between our digital lives and our real lives, one that can be both symbiotic and independent.6 Wurie acknowledges the sweeping changes in American consumer attitudes and behavior from 2009 to 2014. Five to ten years ago, phones did not contain encyclopedic records of day-to-day life. Today, each phone is a ledger, a reservoir of data containing the most recent epoch of a person’s being.7 Phones may contain banking records, GPS information, photographs, histories of websites visited, histories of text message interactions, and thousands of other pieces of data.8 Chief Justice John G. Roberts, Jr., distinguished cell phones from other things that might be found on a person in the Court’s unanimous decision in Riley v. California,9 stating, “the fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought.”10 Further, Tom Goldstein commented that the United States v. Wurie decision was “a sweeping endorsement of digital
Recommended publications
  • How Open Source Is Changing IP Risk in the Soft Ware Supply Chain
    A New Wave of IP Risks: How Open Source is Changing IP Risk in the Software Supply Chain Table of Contents Introduction . 3 Brief Overview of Open Source and Where It Stands Today . 3 The Interplay Between Open Source and IP Risk: . 5 Understanding the Challenges Specific IP Risks in the Open Source Software Supply Chain . 7 Copyright Infringement . 7 Reputation . 9 Exposing IP Secrets . 10 Impacts on the Partner/Customer Relationship . 11 Patent Infringement . 12 Looking Ahead: The Future of Open Source Litigation . 13 Conclusion . 14 I. Introduction Open source software has been integrated into nearly is a testament to the success of open source, it also gives every industry and sector today . According to a 2016 rise to unique challenges for businesses, particularly in survey, approximately 90% of today’s organizations report the area of intellectual property . If a company cannot using open source software .1 That percentage has almost even find all of its open source code or identify its open certainly grown since . One likely reason for open source’s source dependencies, they are also likely unable to boom in popularity is the distinct cost savings it gives ensure that they are remaining compliant with open companies who use it .2 The use of open source software is source licenses and protecting themselves from business now so widespread that many companies are unaware of or reputational risk . how and where it is used, and would be unable to identify all their open source code if asked to do so . In this paper, we will examine the most common IP risks that arise from the use of open source software today, As Mark Radcliffe, a partner in the Silicon Valley office of including copyright infringement, patent infringement, DLA Piper specializing in IP and open source, explains, reputational risk, exposure of IP secrets, and the impact on “virtually all software now has a large number of open the partner/customer relationship .
    [Show full text]
  • Volume 30 Spring 2014
    SYRACUSE JOURNAL OF SCIENCE & TECHNOLOGY LAW VOLUME 30 SPRING 2014 TABLE OF CONTENTS Mass Copyright Infringement Litigation: Of Trolls, Pornography, Settlement and Joinder Christopher Civil………………………………………………………………………………...2 Notice and Manifestation of Assent to Browse-Wrap Agreements in the Age of Evolving Crawlers, Bots, Spiders and Scrapers: How Courts Are Tethered to Their Application of Register and Cairo and Why Congress Should Mandate Use of the Robots Exclusion Standard to Prevent Circumvention of Responsibility Michael Laven…………………………………………………………………………………..56 Seeing Red: Christian Louboutin’s Protection of His Trademark Through His Battle with Yves St. Laurent Sachpreet Bains…………………………………………………………………………………73 I Need a Lawyer: Establishing Statewide New York Communication Access Fund to Secure Legal Accessibility to Deaf and Hard of Hearing Clients Through Video Remote Interpreting Services in Compliance with the Americans with Disabilities Act YooNa Lim………………………………………………………………………………………99 Can You Hear Me Now? Spectrum is Shaping the Telecommunication Industry in an Increasingly Connected America James Zino……………………………………………………………………………………..131 Review of “I Know What You’re Thinking: Brain Imaging and Mental Privacy” Edited by: Sarah Richmond, Geraint Rees, and Sarah J.L. Edwards Jenna Furman…………………………………………………………………………………160 SYRACUSE JOURNAL OF SCIENCE & TECHNOLOGY LAW VOLUME 30 SPRING 2014 2013-2014 EDITORIAL STAFF EDITOR-IN-CHIEF Brittany Jones MANAGING EDITOR Tanjeev Thandi LEAD ARTICLE EDITORS FORM & ACCURACY EDITORS Alessandra
    [Show full text]
  • Monetizing Infringement
    University of Colorado Law School Colorado Law Scholarly Commons Articles Colorado Law Faculty Scholarship 2020 Monetizing Infringement Kristelia García University of Colorado Law School Follow this and additional works at: https://scholar.law.colorado.edu/articles Part of the Entertainment, Arts, and Sports Law Commons, Intellectual Property Law Commons, Law and Economics Commons, and the Legislation Commons Citation Information Kristelia García, Monetizing Infringement, 54 U.C. DAVIS L. REV. 265 (2020), available at https://scholar.law.colorado.edu/articles/1308. Copyright Statement Copyright protected. Use of materials from this collection beyond the exceptions provided for in the Fair Use and Educational Use clauses of the U.S. Copyright Law may violate federal law. Permission to publish or reproduce is required. This Article is brought to you for free and open access by the Colorado Law Faculty Scholarship at Colorado Law Scholarly Commons. It has been accepted for inclusion in Articles by an authorized administrator of Colorado Law Scholarly Commons. For more information, please contact [email protected]. Monetizing Infringement Kristelia García* The deterrence of copyright infringement and the evils of piracy have long been an axiomatic focus of both legislators and scholars. The conventional view is that infringement must be curbed and/or punished in order for copyright to fulfill its purported goals of incentivizing creation and ensuring access to works. This Essay proves this view false by demonstrating that some rightsholders don’t merely tolerate, but actually encourage infringement, both explicitly and implicitly, in a variety of different situations and for one common reason: they benefit from it.
    [Show full text]
  • The (Unfinished) Ballad of Gunslinger/ ©Troll Richard Liebowitz by Steven D
    For exclusive use of MLRC members and other parties specifically authorized by MLRC. © 2019 Media Law Resource Center, Inc. Page 8 August 2019 MLRC MediaLawLetter The (Unfinished) Ballad of Gunslinger/ ©Troll Richard Liebowitz By Steven D. Zansberg You are probably already far more familiar than you wish you were with Richard Liebowitz, the notorious copyright plaintiff’s attorney based in Valley Stream, New York. Mr. Liebowitz has gained notoriety (some might say ignominy) for having filed over 1,500 copyright infringement actions across the nation (some 1,100 in S.D.N.Y.), and having been featured in Slate, The Hollywood Reporter, and even has his own Wikipedia page (do you?). For those fortunate few unfamiliar with Mr. Liebowitz, his entrepreneurial spirit follows a well-developed business model: (1) represent photographers who have registered (or soon will register) their original works (now a requirement for instituting copyright infringement actions, and for recovery of statutory damages of up to $150K/violation plus attorneys’ fees); (2) find infringing (non-licensed) uses of those photos online by using a reverse-image search engine like Google Images, Tin Eye, Pixsy, or Berify; (3) demand an exorbitant amount to settle such cases (typically $25K per photo, most of which would command license fees of, at best, in the tens or hundreds of dollars) and then agree to a settlement figure that is a fraction (often less than half) of the initial extortionate demand. You are probably already far more Because it inevitably would cost more than the insurance familiar than you wish you were deductible to defend such a case, the defendants – many of with Richard Liebowitz, the whom are large media companies – make the rational business notorious copyright plaintiff’s attorney.
    [Show full text]
  • Defense Against the Dark Arts of Copyright Trolling Matthew As G
    Loyola University Chicago, School of Law LAW eCommons Faculty Publications & Other Works 2018 Defense Against the Dark Arts of Copyright Trolling Matthew aS g Jake Haskell Follow this and additional works at: https://lawecommons.luc.edu/facpubs Part of the Civil Procedure Commons, and the Intellectual Property Law Commons Defense Against the Dark Arts of Copyright Trolling Matthew Sag &Jake Haskell * ABSTRACT: In this Article, we offer both a legal and a pragmaticframework for defending against copyright trolls. Lawsuits alleging online copyright infringement by John Doe defendants have accounted for roughly half of all copyright casesfiled in the United States over the past threeyears. In the typical case, the plaintiffs claims of infringement rely on a poorly substantiatedform pleading and are targeted indiscriminately at noninfringers as well as infringers. This practice is a subset of the broaderproblem of opportunistic litigation, but it persists due to certain unique features of copyright law and the technical complexity of Internet technology. The plaintiffs bringing these cases target hundreds or thousands of defendants nationwide and seek quick settlements pricedjust low enough that it is less expensive for the defendant to pay rather than to defend the claim, regardless of the claim's merits. We report new empirical data on the continued growth of this form of copyright trolling in the United States. We also undertake a detailed analysis of the legal andfactual underpinnings of these cases. Despite theirunderlying weakness, plaintiffs have exploited information asymmetries, the high cost of federal court litigation, and the extravagant threat of statutory damages for copyright infringement to leverage settlementsfrom the guilty and the innocent alike.
    [Show full text]
  • Section 512 of Title 17 a Report of the Register of Copyrights May 2020 United States Copyright Office
    united states copyright office section 512 of title 17 a report of the register of copyrights may 2020 united states copyright office section 512 of title 17 a report of the register of copyrights may 2020 U.S. Copyright Office Section 512 Report ACKNOWLEDGEMENTS The publication of this Report is the final output of several years of effort by the Copyright Office to assist Congress with evaluating ways to update the Copyright Act for the 21st century. The genesis of this Report occurred in the midst of the two years of copyright review hearings held by the House Judiciary Committee that spanned the 113th and 114th Congresses. At the twentieth and final hearing in April 2015, the Copyright Office proposed several policy studies to aid Congress in its further review of the Copyright Act. Two studies already underway at the time were completed after the hearings: Orphan Works and Mass Digitization (2015), which the Office later supplemented with a letter to Congress on the “Mass Digitization Pilot Program” (2017), and The Making Available Right in the United States (2016). Additional studies proposed during the final hearing that were subsequently issued by the Office included: the discussion document Section 108 of Title 17 (2017), Section 1201 of Title 17 (2017), and Authors, Attribution, and Integrity: Examining Moral Rights in the United States (2019). The Office also evaluated how the current copyright system works for visual artists, which resulted in the letter to Congress titled “Copyright and Visual Works: The Legal Landscape of Opportunities and Challenges” (2019). Shortly after the hearings ended, two Senators requested a review of the role of copyright law in everyday consumer products and the Office subsequently published a report, Software-Enabled Computer Products (2016).
    [Show full text]
  • |||GET||| Girl Zines 1St Edition
    GIRL ZINES 1ST EDITION DOWNLOAD FREE Alison Piepmeier | 9780814767733 | | | | | Brian Cassidy, Bookseller If the copyright page tells you that the book is a first edition from William Morrow and Company, but the spine of the book tells you that it was published by Walter J. Nov 10, Jason rated it it was amazing. Retrieved 21 November Feb 12, Caitlin Constantine rated it really liked it. Girl Zines 1st edition and printing can be used fairly Girl Zines 1st edition in talking about collectible books, Girl Zines 1st edition in regard to modern fiction. By Tim Ott. Women's Studies. An open-source wiki site solely for zines, small press publications and independent media as well as their history. Prose Studies: History, Theory, Criticism. Williams' Crawdaddy! Intellectual property activism. There are no discussion topics on this book yet. Published on Sep 14, Copyright Alliance. More filters. Indeed, many zines were transformed into Webzinessuch as Boing Boing or monochrom. I've passed this along to the other members of my group as a key piece of research material. While some of the best designs may take only moments of inspiration, others require days if not weeks of careful consideration, revision and refinement. Jun 16, Anna rated it it was amazing Shelves: favorites. Book club Girl Zines 1st edition can usually be identified Girl Zines 1st edition such by one of a few tell-tale signs. With each printing, the publisher removes a number from the line of numbers. In some cases, a number is moved from the left side of Girl Zines 1st edition line to the end of the right side as that printing is exhausted.
    [Show full text]
  • Filed an Amicus Brief
    NOS. 11-2820, 11-2858 UNITED STATES COURT OF APPEALS FOR THE EIGHTH CIRCUIT CAPITOL RECORDS, INC., et al., PLAINTIFFS-APPELLANTS, V. JAMMIE THOMAS-RASSET, DEFENDANT-APPELLEE. On Appeal From The United States District Court For The District of Minnesota Case No. 06-1497 Honorable Michael J. Davis, District Judge BRIEF AMICI CURIAE OF ELECTRONIC FRONTIER FOUNDATION, INTERNET ARCHIVE, ASSOCIATION OF RESEARCH LIBRARIES, ASSOCIATION OF COLLEGE AND RESEARCH LIBRARIES, AMERICAN LIBRARY ASSOCIATION, AND PUBLIC KNOWLEDGE IN SUPPORT OF APPELLEE AND AFFIRMANCE Corynne McSherry Michael Barclay ELECTRONIC FRONTIER FOUNDATION 454 Shotwell Street San Francisco, CA 94110 Telephone: (415) 436-9333 Facsimile: (415) 436-9993 [email protected] Attorneys for Amici Curiae Additional Counsel Listed on Signature Page Appellate Case: 11-2820 Page: 1 Date Filed: 02/10/2012 Entry ID: 3879140 CORPORATE DISCLOSURE STATEMENT Pursuant to Rule 26.1 of the Federal Rules of Appellate Procedure, Amici Curiae Electronic Frontier Foundation, Internet Archive, Association of Research Libraries, Association of College And Research Libraries, The American Library Association and Public Knowledge (collectively, “Amici”) state that none of Amici has a parent corporation and that no publicly held company owns 10% or more of the stock of any of Amici. i Appellate Case: 11-2820 Page: 2 Date Filed: 02/10/2012 Entry ID: 3879140 TABLE OF CONTENTS Page CORPORATE DISCLOSURE STATEMENT .................................................. 1 STATEMENT OF INTEREST ..........................................................................
    [Show full text]
  • A Case for the Public Domain
    Brigham Young University Law School BYU Law Digital Commons Faculty Scholarship 1-1-2013 A Case for the Public Domain Clark D. Asay BYU Law, [email protected] Follow this and additional works at: https://digitalcommons.law.byu.edu/faculty_scholarship Part of the Intellectual Property Law Commons Recommended Citation Clark D. Asay, A Case for the Public Domain, 74 Oʜɪᴏ Sᴛ. L.J. 753 (2013). This Article is brought to you for free and open access by BYU Law Digital Commons. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of BYU Law Digital Commons. For more information, please contact [email protected]. A Case for the Public Domain CLARK D. ASAY* Over the past several decades open license movements have proved highly successful in the software and content worlds. Such movements rely in part on the belief that greater freedom of use triggers innovative activity that is superiorto what a restrictive IP approachyields. Ironically, such open license movements rely on IP rights to promote their visions offreedom and openness. They do so through IP licenses that, while granting significantfreedoms, also impose certain conditions on users such as the "copyleft" requirement in the software world. Such movements rely on this IP-based approach due to fears that, without IP rights and such conditions, a tragedy of the commons would ensue. This Article argues that this IP-based approach, while perhaps helpful in the beginning, is no longer necessary in many cases and in fact prevents the movements from reaching theirfull potential. The IP-based approach has this effect by causing significant transactioncosts, often without offsetting benefits, resulting in a tragedy of the anti-commons.
    [Show full text]
  • The Uneasy Case Against Copyright Trolls
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Faculty Scholarship at Penn Law 2013 The Uneasy Case Against Copyright Trolls Shyamkrishna Balganesh University of Pennsylvania Carey Law School Follow this and additional works at: https://scholarship.law.upenn.edu/faculty_scholarship Part of the Intellectual Property Law Commons, Litigation Commons, and the Technology and Innovation Commons Repository Citation Balganesh, Shyamkrishna, "The Uneasy Case Against Copyright Trolls" (2013). Faculty Scholarship at Penn Law. 425. https://scholarship.law.upenn.edu/faculty_scholarship/425 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship at Penn Law by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. ARTICLES THE UNEASY CASE AGAINST COPYRIGHT TROLLS SHYAMKRISHNA BALGANESH* ABSTRACT The copyright troll and the phenomenon of copyright trolling have thus far received surprisingly little attention in discussions of copyright law and policy. A copyright troll refers to an entity that acquires a tailored interest in a copyrighted work with the sole objective of enforcing claims relating to that work against copiers in a zealous and dogmatic manner. Not being a creator, distributor, performer, or indeed user of the protected work, the copyright troll operates entirely in the market for copyright claims. With specialized skills in monitoring and enforcing copyright infringement, the troll is able to lower its litigation costs, enabling it to bring claims against defendants that an ordinary copyright owner might have chosen not to. As a matter of law, the copyright troll’s model usually complies with all of copyright’s formal rules.
    [Show full text]
  • The Shifting Boundaries of Convergence Between U.S
    Brooklyn Journal of International Law Volume 41 Article 13 Issue 3 SYMPOSIUM: Reconsidering the Tax Treaty 2016 Copyright Competition: The hiS fting Boundaries of Convergence Between U.S. and Canadian Copyright Regimes in the Digital Age David Amar Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjil Part of the Intellectual Property Law Commons, and the Transnational Law Commons Recommended Citation David Amar, Copyright Competition: The Shifting Boundaries of Convergence Between U.S. and Canadian Copyright Regimes in the Digital Age, 41 Brook. J. Int'l L. (2016). Available at: https://brooklynworks.brooklaw.edu/bjil/vol41/iss3/13 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of International Law by an authorized editor of BrooklynWorks. COPYRIGHT COMPETITION: THE SHIFTING BOUNDARIES OF CONVERGENCE BETWEEN U.S. AND CANADIAN COPYRIGHT REGIMES IN THE DIGITAL AGE INTRODUCTION s we move further and further into the digital age, it has Abecome increasingly easy to create, locate, develop, and share information online. With the near universal proliferation of the Internet in North America,1 measures have been taken to ensure that those who hold copyright in their created works may remain certain that their intellectual property rights remain protected.2 Additionally, the digital age has afforded users man- ifold opportunity to both create and share infringing materials, and this ease has led to international tension concerning
    [Show full text]
  • White Paper on Remixes, First Sale, and Statutory Damages
    White Paper on Remixes, First Sale, and Statutory Damages Copyright Policy, Creativity, and Innovation in the Digital Economy THE DEPARTMENT OF COMMERCE INTERNET POLICY TASK FORCE January 2016 Message from Secretary Penny Pritzker Since the founding of our nation, the United States has recognized the importance of copyright in encouraging creative expression by incentivizing people to produce and share the works that contribute to America’s leading role as a cultural and economic powerhouse. Our copyright system plays a critical role in promoting and disseminating works of authorship and provides diverse benefits for large and small businesses, consumers, authors, artists, and workers in the information, entertainment, and technology sectors. A healthy copyright system strikes important balances between rights and exceptions— delineating what is protectable and what is not, determining which types of uses require permission or payment, and establishing appropriate frameworks to effectively protect rights and foster creativity and innovation. These balances must be reviewed regularly to ensure they continue to function well as a foundation for America’s culture and economy. The Internet has transformed the world by introducing new ways for people to communicate, create, innovate, and conduct business in the global digital economy. The goals of our national copyright policy and our global Internet policy should work in tandem. The U.S. Department of Commerce has played a key role in addressing Internet policy-related issues since it launched the Internet Policy Task Force in April 2010. Two years ago, the Task Force published a Green Paper on Copyright Policy, Creativity and Innovation in the Digital Economy—the most comprehensive assessment of digital copyright policy issued by any Administration since 1995.
    [Show full text]